首页> 外文会议>InfoWARcon : Defining the European perspective >'Towards a Definition: Computer Terrorism and the Information Infrastructure'
【24h】

'Towards a Definition: Computer Terrorism and the Information Infrastructure'

机译:“走向定义:计算机恐怖主义与信息基础设施”

获取原文
获取原文并翻译 | 示例

摘要

A common folly of strategic planning is to ignore the evolution of threats and tactics. In his History of the Second World War, Liddel Hart attributes the Germans' success in May 1940 to Allied blunders that were "largely due to the prevalence of out-of-date ideas."1 Fundamental change in the dynamics of international relations is always difficult to recognize.2 The continuing evolution in information technology is not nearly as subtle, and its consequences are not divorced from national security considerations. Terrorism, like any other attack of political violence, is a threat to the national security of a liberal democracy. Many aspects of information technology carry national security implications. Before policymakers blindly embrace global designs of information infrastructures, they should first determine: (1) how information technology affects international politics at a fundamental level; (2) how such technology affects the nature of competition among states within international politics; and (3) whether information technology itself acquires a political character. Once these elements have been evaluated, one will be better prepared to orient strategies around subtle changes in international relations and national security.
机译:战略规划的一个愚蠢做法是忽略威胁和战术的演变。里德尔·哈特(Liddel Hart)在他的《第二次世界大战历史》中将德国人在1940年5月的成功归因于盟军的失误,“主要是由于过时的思想盛行。” 1国际关系动态的根本变化始终是2信息技术的持续发展几乎没有那么微妙,其后果也没有脱离国家安全考虑。恐怖主义与其他任何政治暴力袭击一样,都是对自由民主国家安全的威胁。信息技术的许多方面都涉及国家安全。在决策者盲目接受信息基础设施的全球设计之前,他们应该首先确定:(1)信息技术如何从根本上影响国际政治; (2)这种技术如何影响国际政治内部国家之间竞争的性质; (3)信息技术本身是否具有政治性。一旦对这些要素进行了评估,就可以更好地为围绕国际关系和国家安全的微妙变化制定战略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号